The Panda's Lair


Sections

Bouncers
Connection Test
DCC Exploits
Files Needed
Flooders
Hanson Programs
ICMP Programs
ICQ Programs
Link Lookers
Mail Programs
Misc Programs
Multi Programs
Nukers
OOB Programs
Patches
Port Bombers
Port Listeners
Port Scanners
Source Code
Spoofers
UDP Programs
Wingate Programs

Misc


[email protected]

Description


D.O.S. attacks do exactly as the name implies. They deny service to users (stop people from being able to use certain services on the internet) or they stop users from getting on the internet at all........

Bouncers
- These programs will let you connect to IRC through a friends IP. Very usefull if you've been k-lined.........

Connection Test
- These programs test the lag between two computers........

DCC Exploits
- These programs exploit the dcc command in mIRC...........

Files Needed
- These programs contain many files that maybe needed to run certain programs. If the program requires a certain file, the program will error and tell you that a certain file is missing. Download the file here and run the install program, unzip it to the dir where the program is, or unzip it to your windows/system dir........

Flooders
- These programs contain files that are used to flood someone, usually on IRC. They will flood the user, try and nick collide the person, and many other things. Basically they are just real annoying...........

Hanson Programs
- These programs exploit a bug in mIRC 5.3*.

ICMP Programs
- The ICMP Programs section contains files that are used to test the lag between two computers. Well sort of. These programs will lag the fuck out of someone's connection that they will get disconnected........

ICQ Programs
- These programs affect ICQ in many ways by spoofing UIN numbers, bombing the shit out of a UIN number, or by killing ICQ.

Link Lookers
- The Link Lookers section contains files that find out when two servers split from each other while chatting. These programs can also be used along with the other programs to take over channels on IRC........

Mail Programs
- The Mail Programs section contains files that are used to anon e-mail someone, to clean up your mail box when you have been mail bombed, and also the mail bombers.......

Misc Programs
- The Misc Programs section contains files that really don't have a section to belong to. Many of these programs are worth checking out though.

Multi Programs
- The Multi Programs section contains files that contain more than one type of D.O.S. attack. Very handy when all of the programs that you need are within one user interface........

Nukers
- The Nukers section contains files that are used to kill someone connection. These programs are most commonly used on IRC. They try and disconnect the user from the port that they are connected to on the IRC server.......

OOB Programs
- These programs affect clients by sending an "Out Of Band" eception message to an ips ports. This program usually causes windows to error (Blue Screen Error).

Patches
- These programs help you to protect your system from certain types of attacks or are used to update some of the software on your computer. Install each patch that is required making sure that you reboot your computer between each patch you install.......

Port Bombers
- These programs flood/bomb an open port sometimes causing lag to the ip you are doing this to. They can also be used to take up all of the ips resources, which will then cause the port to close and the connection to terminate. Please note that the killing of an ip by using a port bomber is very rare..........

Port Listeners
- These programs keep watch over ports on your system to help protect you against many denial of service attacks. If the program detects a connection to a port from an ip, it will warn you and log the attack. These logs can then be turned over to your isp (Internet Service Provider). Your isp will then contact the attackers isp and action will be taken.

Port Scanners
- These programs scan ips for open ports. The information collected from these programs can be used to cause damage or to tell you what ports on your computer that need to be secured. Many denial of service attacks require the ip to have an open port and these programs will help you in determining if the port is open.

Source Code
- In this section, you will find source code for many different denial of service attacks. Use these to learn how certain attacks work and also learn how to write your own programs. You will find source code for almost every major compiler.........

Spoofers
- The Spoofers section contains files that are used to spoof your ip number or ident number. There are also some programs that will create "ghost" connections with fake ips.......

Udp Programs
- The UDP Programs section contains files that can lag a persons connection........

Wingate Programs
- The Wingate Programs section contains files that will exploit wingate servers..........

Hexing Programs

Virus Programs

Firewall Programs

Password Generators

Virus Engines

Search Engine






http://corelreef1.webjump.com/transam1.html

http://corelreef1.webjump.com/security.html

http://members.aol.com/CorelReef/lionden.html

http://corelreefs.webjump.com/lionden1.html

[email protected]

©1997, 1998, 1999 CorelReef Web Designs | Graphics ©1997 CorelReef
The CorelReef Web Designs is a trademark of CorelReef